CVE-2017-13720
Debian Security Advisory 3995-1
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrectly skipped in situations involving ? characters.
En la función PatternMatch en fontfile/fontdir.c en libXfont, en versiones hasta la 1.5.2 y versiones 2.x hasta la 2.0.2, un atacante con acceso a una conexión X puede provocar una sobrelectura de búfer durante una comparación de patrones de fuentes, lo que da lugar a una revelación de información o cierre inesperado (denegación de servicio). Esto ocurre porque se omiten de manera incorrecta los caracteres "\0" en situaciones en las que existen caracteres ?.
It was discovered that libXfont incorrectly handled certain patterns in PatternMatch. A local attacker could use this issue to cause libXfont to crash, resulting in a denial of service, or possibly obtain sensitive information. It was discovered that libXfont incorrectly handled certain malformed PCF files. A local attacker could use this issue to cause libXfont to crash, resulting in a denial of service, or possibly obtain sensitive information. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-08-28 CVE Reserved
- 2017-10-10 CVE Published
- 2024-08-05 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-125: Out-of-bounds Read
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1500690 | Issue Tracking | |
https://bugzilla.suse.com/show_bug.cgi?id=1054285 | Issue Tracking |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d1e670a4a8704b8708e493ab6155589bcd570608 | 2017-11-13 |
URL | Date | SRC |
---|---|---|
http://www.debian.org/security/2017/dsa-3995 | 2017-11-13 | |
https://security.gentoo.org/glsa/201711-08 | 2017-11-13 | |
https://www.x.org/releases/individual/lib/libXfont2-2.0.2.tar.bz2 | 2017-11-13 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
X.org Search vendor "X.org" | Libxfont Search vendor "X.org" for product "Libxfont" | <= 1.5.2 Search vendor "X.org" for product "Libxfont" and version " <= 1.5.2" | - |
Affected
| ||||||
X.org Search vendor "X.org" | Libxfont Search vendor "X.org" for product "Libxfont" | 2.0.0 Search vendor "X.org" for product "Libxfont" and version "2.0.0" | - |
Affected
| ||||||
X.org Search vendor "X.org" | Libxfont Search vendor "X.org" for product "Libxfont" | 2.0.1 Search vendor "X.org" for product "Libxfont" and version "2.0.1" | - |
Affected
|